CVE-2025-26417
BaseFortify
Publication date: 2025-08-26
Last updated on: 2025-09-02
Assigner: Android (associated with Google Inc. or Open Handset Alliance)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | 12.0 | |
| android | 12.1 | |
| android | 13.0 | |
| android | 14.0 | |
| android | 15.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-610 | The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a possible bypass of user consent in the checkWhetherCallingAppHasAccess function of DownloadProvider.java. It occurs due to a confused deputy problem when opening files in shared storage, allowing an attacker to access local information without needing additional execution privileges or user interaction.
How can this vulnerability impact me? :
The vulnerability can lead to local information disclosure, meaning sensitive data stored in shared storage could be accessed without proper user consent or authorization, potentially compromising your privacy or security.